综述:使用机器学习的云计算数据安全

Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi
{"title":"综述:使用机器学习的云计算数据安全","authors":"Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi","doi":"10.1109/IC3I56241.2022.10072968","DOIUrl":null,"url":null,"abstract":"In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"542 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review: Data Security in Cloud Computing Using Machine Learning\",\"authors\":\"Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi\",\"doi\":\"10.1109/IC3I56241.2022.10072968\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"542 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072968\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072968","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在今天的IT行业中,云计算和更广泛的云服务部门已经获得了广泛的接受。简而言之,云服务提供云计算,它允许通过互联网按需访问it资源,并采用基于订阅授权和集中托管的按使用付费定价模式。随着21世纪越来越数字化,对公共云服务的需求正以前所未有的速度增长。云计算使得通过互联网访问服务器、存储、数据库和各种应用服务变得容易。云环境支持各种优点,但也有一些缺点。尽管云服务提供商实施了最高的行业认证和安全要求,但在第三方服务提供商上存储敏感数据总是存在风险。在讨论数据安全性时,安全和隐私必须发挥重要作用,特别是在处理敏感数据时。为了解决这个问题,已经产生了许多解决方案。由于现有的解决方案缺乏分析,因此有必要对现有的重要工作进行发现、分类和分析。本文介绍并简要分析了在云环境中安全交换和保护数据的主要方法。对每种特定技术的讨论涵盖了其在数据保护中的作用,该领域的前瞻性和可靠的解决方案,范围,未来方向等。然后根据需求和结果探索方法的适用性和完整性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Review: Data Security in Cloud Computing Using Machine Learning
In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信